{"api_version":"1","generated_at":"2026-05-03T06:47:29+00:00","cve":"CVE-2005-2127","urls":{"html":"https://cve.report/CVE-2005-2127","api":"https://cve.report/api/cve/CVE-2005-2127.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2005-2127","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2005-2127"},"summary":{"title":"CVE-2005-2127","description":"Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\"","state":"PUBLISHED","assigner":"microsoft","published_at":"2005-08-19 04:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["CWE-119","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"","vector":"AV:N/AC:L/Au:N/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/959049","name":"http://www.kb.cert.org/vuls/id/959049","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Vulnerability Note VU#959049","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/14594","name":"http://www.securityfocus.com/bid/14594","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory","VDB Entry"],"title":"Microsoft Visual Studio .NET msdds.dll Remote Code Execution Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.us-cert.gov/cas/techalerts/TA06-220A.html","name":"http://www.us-cert.gov/cas/techalerts/TA06-220A.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Technical Cyber Security Alert TA06-220A -- Microsoft Products Contain Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17509","name":"http://secunia.com/advisories/17509","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Third Party Advisory"],"title":"Secunia - Advisories - Nortel CallPilot Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.us-cert.gov/cas/techalerts/TA05-347A.html","name":"http://www.us-cert.gov/cas/techalerts/TA05-347A.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Technical Cyber Security Alert TA05-347A -- Microsoft Internet Explorer Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/16480","name":"http://secunia.com/advisories/16480","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch","Vendor Advisory"],"title":"Secunia - Advisories - Microsoft Windows COM Object Instantiation Memory Corruption Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/740372","name":"http://www.kb.cert.org/vuls/id/740372","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Vulnerability Note VU#740372","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1014727","name":"http://securitytracker.com/id?1014727","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Patch","Third Party Advisory","VDB Entry","Vendor Advisory"],"title":"SecurityTracker.com Archives - Microsoft 'msdds.dll' COM Object Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34754","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34754","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17172","name":"http://secunia.com/advisories/17172","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Third Party Advisory"],"title":"Secunia - Advisories - Avaya Various Products Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/17223","name":"http://secunia.com/advisories/17223","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Permissions Required","Third Party Advisory"],"title":"Secunia - Advisories - Nortel Centrex IP Client Manager Multiple Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/898241","name":"http://www.kb.cert.org/vuls/id/898241","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Vulnerability Note VU#898241","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securityreason.com/securityalert/72","name":"http://securityreason.com/securityalert/72","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"SecurityReason","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/15061","name":"http://www.securityfocus.com/bid/15061","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry"],"title":"Microsoft Internet Explorer COM Object Instantiation Variant Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.securityfocus.com/archive/1/470690/100/0/threaded","name":"http://www.securityfocus.com/archive/1/470690/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.us-cert.gov/cas/techalerts/TA05-284A.html","name":"http://www.us-cert.gov/cas/techalerts/TA05-284A.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Technical Cyber Security Alert TA05-284A -- Microsoft Windows, Internet Explorer, and Exchange Server Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.microsoft.com/technet/security/advisory/906267.mspx","name":"http://www.microsoft.com/technet/security/advisory/906267.mspx","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Patch","Vendor Advisory"],"title":"Your request has been blocked. This could be\r\n                        due to several reasons.","mime":"text/html","httpstatus":"403","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21895","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21895","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["VDB Entry"],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2005/1450","name":"http://www.vupen.com/english/advisories/2005/1450","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Broken Link"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://isc.sans.org/diary.php?date=2005-08-18","name":"http://isc.sans.org/diary.php?date=2005-08-18","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"SANS - Internet Storm Center - Cooperative Cyber Threat Monitor And Alert System","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf","name":"http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468","name":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Repository  /  Oval Repository","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052","name":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Microsoft Security Bulletin MS05-052 - Critical | Microsoft Docs","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2005-2127","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2005-2127","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ati","cpe5":"catalyst_driver","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net_framework","cpe6":"1.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net_framework","cpe6":"1.1","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net_framework","cpe6":"1.1","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":".net_framework","cpe6":"1.1","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"2000","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"2000","cpe7":"*","cpe8":"*","cpe9":"ja","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"2000","cpe7":"*","cpe8":"*","cpe9":"ko","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"2000","cpe7":"*","cpe8":"*","cpe9":"zh","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"2000","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"2000","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"2000","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"xp","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"xp","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"office","cpe6":"xp","cpe7":"sp3","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"project","cpe6":"2000","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"project","cpe6":"2002","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"project","cpe6":"2002","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"project","cpe6":"2003","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"project","cpe6":"2003","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"project","cpe6":"98","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2000","cpe7":"sr1","cpe8":"*","cpe9":"*","cpe10":"enterprise","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2002","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2002","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"professional","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2002","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2002","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2002","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"professional","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2002","cpe7":"sp2","cpe8":"*","cpe9":"*","cpe10":"standard","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2003","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2003","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"professional","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2003","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"standard","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visio","cpe6":"2003","cpe7":"sp1","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_.net","cpe6":"2002","cpe7":"gold","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_.net","cpe6":"2003","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise_architect","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_.net","cpe6":"2003","cpe7":"gold","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_.net","cpe6":"gold","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"academic","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_.net","cpe6":"gold","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise_architect","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_.net","cpe6":"gold","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"enterprise_developer","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_.net","cpe6":"gold","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"professional","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2005","cve_id":"2127","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"microsoft","cpe5":"visual_studio_.net","cpe6":"gold","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"trial","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T22:15:37.364Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"VU#959049","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/959049"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://isc.sans.org/diary.php?date=2005-08-18"},{"name":"20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/470690/100/0/threaded"},{"name":"72","tags":["third-party-advisory","x_refsource_SREASON","x_transferred"],"url":"http://securityreason.com/securityalert/72"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf"},{"name":"TA05-347A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA05-347A.html"},{"name":"MS05-052","tags":["vendor-advisory","x_refsource_MS","x_transferred"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052"},{"name":"15061","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/15061"},{"name":"17223","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17223"},{"name":"oval:org.mitre.oval:def:1454","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454"},{"name":"16480","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/16480"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.microsoft.com/technet/security/advisory/906267.mspx"},{"name":"microsoft-ie-mshtml-dos(34754)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34754"},{"name":"17172","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17172"},{"name":"oval:org.mitre.oval:def:1538","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538"},{"name":"Win-msdss-command-execution(21895)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21895"},{"name":"oval:org.mitre.oval:def:1535","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535"},{"name":"14594","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/14594"},{"name":"oval:org.mitre.oval:def:1468","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468"},{"name":"17509","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/17509"},{"name":"TA06-220A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA06-220A.html"},{"name":"oval:org.mitre.oval:def:1464","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464"},{"name":"VU#740372","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/740372"},{"name":"VU#898241","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/898241"},{"name":"1014727","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1014727"},{"name":"TA05-284A","tags":["third-party-advisory","x_refsource_CERT","x_transferred"],"url":"http://www.us-cert.gov/cas/techalerts/TA05-284A.html"},{"name":"ADV-2005-1450","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2005/1450"},{"name":"oval:org.mitre.oval:def:1155","tags":["vdb-entry","signature","x_refsource_OVAL","x_transferred"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2005-08-18T00:00:00.000Z","descriptions":[{"lang":"en","value":"Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\""}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-19T14:57:01.000Z","orgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","shortName":"microsoft"},"references":[{"name":"VU#959049","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/959049"},{"tags":["x_refsource_MISC"],"url":"http://isc.sans.org/diary.php?date=2005-08-18"},{"name":"20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/470690/100/0/threaded"},{"name":"72","tags":["third-party-advisory","x_refsource_SREASON"],"url":"http://securityreason.com/securityalert/72"},{"tags":["x_refsource_CONFIRM"],"url":"http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf"},{"name":"TA05-347A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA05-347A.html"},{"name":"MS05-052","tags":["vendor-advisory","x_refsource_MS"],"url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052"},{"name":"15061","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/15061"},{"name":"17223","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17223"},{"name":"oval:org.mitre.oval:def:1454","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454"},{"name":"16480","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/16480"},{"tags":["x_refsource_MISC"],"url":"http://www.microsoft.com/technet/security/advisory/906267.mspx"},{"name":"microsoft-ie-mshtml-dos(34754)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34754"},{"name":"17172","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17172"},{"name":"oval:org.mitre.oval:def:1538","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538"},{"name":"Win-msdss-command-execution(21895)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21895"},{"name":"oval:org.mitre.oval:def:1535","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535"},{"name":"14594","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/14594"},{"name":"oval:org.mitre.oval:def:1468","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468"},{"name":"17509","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/17509"},{"name":"TA06-220A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA06-220A.html"},{"name":"oval:org.mitre.oval:def:1464","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464"},{"name":"VU#740372","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/740372"},{"name":"VU#898241","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/898241"},{"name":"1014727","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1014727"},{"name":"TA05-284A","tags":["third-party-advisory","x_refsource_CERT"],"url":"http://www.us-cert.gov/cas/techalerts/TA05-284A.html"},{"name":"ADV-2005-1450","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2005/1450"},{"name":"oval:org.mitre.oval:def:1155","tags":["vdb-entry","signature","x_refsource_OVAL"],"url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"secure@microsoft.com","ID":"CVE-2005-2127","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\""}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"VU#959049","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/959049"},{"name":"http://isc.sans.org/diary.php?date=2005-08-18","refsource":"MISC","url":"http://isc.sans.org/diary.php?date=2005-08-18"},{"name":"20070606 IE 6/Microsoft Html Popup Window (mshtml.dll) DoS","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/470690/100/0/threaded"},{"name":"72","refsource":"SREASON","url":"http://securityreason.com/securityalert/72"},{"name":"http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf","refsource":"CONFIRM","url":"http://support.avaya.com/elmodocs2/security/ASA-2005-214.pdf"},{"name":"TA05-347A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA05-347A.html"},{"name":"MS05-052","refsource":"MS","url":"https://docs.microsoft.com/en-us/security-updates/securitybulletins/2005/ms05-052"},{"name":"15061","refsource":"BID","url":"http://www.securityfocus.com/bid/15061"},{"name":"17223","refsource":"SECUNIA","url":"http://secunia.com/advisories/17223"},{"name":"oval:org.mitre.oval:def:1454","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1454"},{"name":"16480","refsource":"SECUNIA","url":"http://secunia.com/advisories/16480"},{"name":"http://www.microsoft.com/technet/security/advisory/906267.mspx","refsource":"MISC","url":"http://www.microsoft.com/technet/security/advisory/906267.mspx"},{"name":"microsoft-ie-mshtml-dos(34754)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/34754"},{"name":"17172","refsource":"SECUNIA","url":"http://secunia.com/advisories/17172"},{"name":"oval:org.mitre.oval:def:1538","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1538"},{"name":"Win-msdss-command-execution(21895)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/21895"},{"name":"oval:org.mitre.oval:def:1535","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1535"},{"name":"14594","refsource":"BID","url":"http://www.securityfocus.com/bid/14594"},{"name":"oval:org.mitre.oval:def:1468","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1468"},{"name":"17509","refsource":"SECUNIA","url":"http://secunia.com/advisories/17509"},{"name":"TA06-220A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA06-220A.html"},{"name":"oval:org.mitre.oval:def:1464","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1464"},{"name":"VU#740372","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/740372"},{"name":"VU#898241","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/898241"},{"name":"1014727","refsource":"SECTRACK","url":"http://securitytracker.com/id?1014727"},{"name":"TA05-284A","refsource":"CERT","url":"http://www.us-cert.gov/cas/techalerts/TA05-284A.html"},{"name":"ADV-2005-1450","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2005/1450"},{"name":"oval:org.mitre.oval:def:1155","refsource":"OVAL","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1155"}]}}}},"cveMetadata":{"assignerOrgId":"f38d906d-7342-40ea-92c1-6c4a2c6478c8","assignerShortName":"microsoft","cveId":"CVE-2005-2127","datePublished":"2005-08-19T04:00:00.000Z","dateReserved":"2005-07-02T00:00:00.000Z","dateUpdated":"2024-08-07T22:15:37.364Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2005-08-19 04:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["CWE-119","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P","baseScore":7.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":true,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ati:catalyst_driver:*:*:*:*:*:*:*:*","matchCriteriaId":"62E822DD-6123-4CD8-9FE4-BC8A91D94F80"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:1.1:*:*:*:*:*:*:*","matchCriteriaId":"1A927C9E-5CCC-4FC1-AE63-24B96A5FC51A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:1.1:sp1:*:*:*:*:*:*","matchCriteriaId":"0BF6AE15-EAC3-4100-A742-211026C79CCC"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:1.1:sp2:*:*:*:*:*:*","matchCriteriaId":"A2804E22-FFF4-4301-8958-16B32CE5ECD1"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:.net_framework:1.1:sp3:*:*:*:*:*:*","matchCriteriaId":"B33B1B47-EEA0-4B1F-AC03-CAB56AB42DC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:*:*:*:*:*:*:*:*","matchCriteriaId":"49AD45BF-8A91-4C87-AF15-D38D8468A4C5"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:*:*:*:*:*:*:*","matchCriteriaId":"A9A82D13-513C-46FA-AF51-0582233E230A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:*:*:ja:*:*:*:*","matchCriteriaId":"757EC6C1-F5E2-45CD-9F7F-7760ECEDC842"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:*:*:ko:*:*:*:*","matchCriteriaId":"59B1B68C-86F1-4FA4-9F82-3E8761ED1E74"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:*:*:zh:*:*:*:*","matchCriteriaId":"716DDA05-D094-4837-852C-0511CDDD5ABC"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:sp1:*:*:*:*:*:*","matchCriteriaId":"3C54DDAF-8D7F-4A7D-9186-6048D4C850B2"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:sp2:*:*:*:*:*:*","matchCriteriaId":"67388076-420D-4327-A436-329177EA6F42"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:2000:sp3:*:*:*:*:*:*","matchCriteriaId":"4891122F-AD7F-45E6-98C6-833227916F6B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:xp:sp1:*:*:*:*:*:*","matchCriteriaId":"5AB85A3C-EFA3-485D-84C5-7976718AEAE0"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:xp:sp2:*:*:*:*:*:*","matchCriteriaId":"9D02D769-061D-44A5-B019-F4E653DF615A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:office:xp:sp3:*:*:*:*:*:*","matchCriteriaId":"79BA1175-7F02-4435-AEA6-1BA8AADEB7EF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:98:*:*:*:*:*:*:*","matchCriteriaId":"77BFDC2A-4AE1-4FC8-ABA7-0400D46EA587"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2000:*:*:*:*:*:*:*","matchCriteriaId":"3F09162C-01F0-4056-94D3-995713F92AE9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2002:*:*:*:*:*:*:*","matchCriteriaId":"2AE2D3E0-49E4-410E-B63A-753BDE8995BB"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2002:sp1:*:*:*:*:*:*","matchCriteriaId":"9B14AE8E-1BFF-4458-87CC-357957F18F8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2003:*:*:*:*:*:*:*","matchCriteriaId":"34EFAEFE-2BDE-4111-91F5-E9F75ADFA920"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:project:2003:sp1:*:*:*:*:*:*","matchCriteriaId":"AC1DA2B8-C41B-4EB9-A58F-E4E63F695A55"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2000:sr1:*:*:enterprise:*:*:*","matchCriteriaId":"B4EC96E0-8D7C-4C72-8F04-97B0B675306E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2002:*:*:*:*:*:*:*","matchCriteriaId":"8E24DF34-F4A8-4C28-9593-F019FE3E3BA2"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2002:*:*:*:professional:*:*:*","matchCriteriaId":"FF41DACB-D707-4ED3-BA2E-2EEABC17FC4D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2002:sp1:*:*:*:*:*:*","matchCriteriaId":"70D447B9-4604-447C-88FC-F5DC8F77603C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:*:*:*:*","matchCriteriaId":"D0D2C5C3-225C-49DC-B9C7-C5BC05900F2E"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:professional:*:*:*","matchCriteriaId":"F6E69C81-2894-4319-9FBD-60AE719942E9"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2002:sp2:*:*:standard:*:*:*","matchCriteriaId":"8BC60369-95D2-475B-9FDA-5D1C13FEE8DF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2003:*:*:*:*:*:*:*","matchCriteriaId":"511E22C6-DB04-44A0-906D-F432DD42CA5C"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2003:*:*:*:professional:*:*:*","matchCriteriaId":"9BF7D109-38E6-4FEE-8F9B-9A481D50DCFA"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2003:*:*:*:standard:*:*:*","matchCriteriaId":"3D931561-2312-4770-B418-FB622856DF34"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visio:2003:sp1:*:*:*:*:*:*","matchCriteriaId":"6FBEFBED-72F3-447B-8164-9E5C16828484"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_.net:2002:gold:*:*:*:*:*:*","matchCriteriaId":"E17BD019-DD35-413E-ACBA-2E77C8A1247D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_.net:2003:*:*:*:enterprise_architect:*:*:*","matchCriteriaId":"A681100F-9DE5-4BE6-ADE9-64A3808C7CDE"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_.net:2003:gold:*:*:*:*:*:*","matchCriteriaId":"B9E6C132-4F4B-4FB0-9DDC-DD9750D8552D"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:academic:*:*:*","matchCriteriaId":"AEC99110-8EC1-4FEC-9535-B27AF1965DBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:enterprise_architect:*:*:*","matchCriteriaId":"B35FE238-4380-41C7-A956-EA3F2D5F9159"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:enterprise_developer:*:*:*","matchCriteriaId":"A8E772B4-8E7D-4D35-8C59-5959123AA572"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:professional:*:*:*","matchCriteriaId":"4AFEC24E-5FA5-4653-BBAA-AFEBCC3F149B"},{"vulnerable":true,"criteria":"cpe:2.3:a:microsoft:visual_studio_.net:gold:*:*:*:trial:*:*:*","matchCriteriaId":"D451D000-00DC-46A9-9D1E-2C715D6D1787"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2005","CveId":"2127","Ordinal":"1","Title":"CVE-2005-2127","CVE":"CVE-2005-2127","Year":"2005"},"notes":[{"CveYear":"2005","CveId":"2127","Ordinal":"1","NoteData":"Microsoft Internet Explorer 5.01, 5.5, and 6 allows remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a web page with embedded CLSIDs that reference certain COM objects that are not intended for use within Internet Explorer, as originally demonstrated using the (1) DDS Library Shape Control (Msdds.dll) COM object, and other objects including (2) Blnmgrps.dll, (3) Ciodm.dll, (4) Comsvcs.dll, (5) Danim.dll, (6) Htmlmarq.ocx, (7) Mdt2dd.dll (as demonstrated using a heap corruption attack with uninitialized memory), (8) Mdt2qd.dll, (9) Mpg4ds32.ax, (10) Msadds32.ax, (11) Msb1esen.dll, (12) Msb1fren.dll, (13) Msb1geen.dll, (14) Msdtctm.dll, (15) Mshtml.dll, (16) Msoeacct.dll, (17) Msosvfbr.dll, (18) Mswcrun.dll, (19) Netshell.dll, (20) Ole2disp.dll, (21) Outllib.dll, (22) Psisdecd.dll, (23) Qdvd.dll, (24) Repodbc.dll, (25) Shdocvw.dll, (26) Shell32.dll, (27) Soa.dll, (28) Srchui.dll, (29) Stobject.dll, (30) Vdt70.dll, (31) Vmhelper.dll, and (32) Wbemads.dll, aka a variant of the \"COM Object Instantiation Memory Corruption vulnerability.\"","Type":"Description","Title":"CVE-2005-2127"},{"CveYear":"2005","CveId":"2127","Ordinal":"2","NoteData":"2005-08-19","Type":"Other","Title":"Published"},{"CveYear":"2005","CveId":"2127","Ordinal":"3","NoteData":"2018-10-19","Type":"Other","Title":"Modified"}]}}}